Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    136s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 09:12

General

  • Target

    07a3273b9918b7ecbd2a22b3a8e61bc1_JaffaCakes118.exe

  • Size

    101KB

  • MD5

    07a3273b9918b7ecbd2a22b3a8e61bc1

  • SHA1

    c3a101466578a60b4a15c508983d6cb4cf48da8e

  • SHA256

    29b732557cb9e5f15b0c92ce6efb0c2c5ef22bd59068f3a87d40c4560ebaa2b5

  • SHA512

    3f1dd243cc8bd80113498781eba2c8b99c6ad765dcd3ef45380519f0705f4fdabb332aa7532a910a0d8e7039817d7d15412477355fd79a2888a96119bd9d960e

  • SSDEEP

    1536:ApgpHzb9dZVX9fHMvG0D3XJdgaGtB1V/bax8isQzxX/8b+qJSaLEYdVN25+Q/:WgXdZt9P6D3XJW3z/+Dzx0b+qJSsNzQ/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07a3273b9918b7ecbd2a22b3a8e61bc1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\07a3273b9918b7ecbd2a22b3a8e61bc1_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Program Files (x86)\EBcds\EBcdssvc.exe
      "C:\Program Files (x86)\EBcds\EBcdssvc.exe" -s
      2⤵
      • Executes dropped EXE
      PID:2308
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c \DelUS.bat
      2⤵
        PID:2172
    • C:\Program Files (x86)\EBcds\EBcdssvc.exe
      "C:\Program Files (x86)\EBcds\EBcdssvc.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Program Files (x86)\EBcds\EBcds.exe
        /u
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4612
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1296,i,17325488789339133686,9539570259395798500,262144 --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:8
      1⤵
        PID:4196

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\DelUS.bat

        Filesize

        228B

        MD5

        233e97bc06c3fc862720e2f0cb60343d

        SHA1

        c6f0dbe1cbbfc49773cf193f3d07ada4b556025e

        SHA256

        3a89d93516e176bf56f7cd2b572924c854bd1ba91b5208f9235e9ab4f785d05b

        SHA512

        f68acfa36bb9c6417a8b5a1301b5d9dbc0deee92895f6176b08b196fd165f8c8a243e631b78464788196fbfaed1fa54a434c5e9f515dd016f46ad7eeaef73a8c

      • C:\Program Files (x86)\EBcds\EBcds.exe

        Filesize

        220KB

        MD5

        f5309c8b31a83bcbcb340cf0b951c016

        SHA1

        323a5eba82629c6734bda2f91469ac51d8c31c99

        SHA256

        321dec38ad670d6440467cc1c851d4e7a8ad16e3ba43a2d8e427922dfd177bb7

        SHA512

        f986323b9b21fc4e4a0d379c1eae0328d92fca82f3de8a425bee1361b0856c8e03ceafe2c863812e432e004da4566215b79b9f9aba38896fe2c2d1ab9c1f7a1b

      • C:\Program Files (x86)\EBcds\EBcdssvc.exe

        Filesize

        20KB

        MD5

        134454ccda9649c659682fa0b1d5d687

        SHA1

        1db5be866ccf1f677ae54196489e4abbbc1b1c29

        SHA256

        3c3d9f236f4b70f2bdc48a61953b5f72696628e86c3f53f8070df66e70d5e347

        SHA512

        77ada47a7bb607224db3ace6274b6e27a497389c8573046decad6409beba1392e53a95bf4971ee0c212611145ed48003de3f72d8534b9fa7f520ca0ebe56107c

      • C:\Users\Admin\AppData\Local\Temp\nsuEA13.tmp\SelfDelete.dll

        Filesize

        24KB

        MD5

        7bf1bd7661385621c7908e36958f582e

        SHA1

        43242d7731c097e95fb96753c8262609ff929410

        SHA256

        c0ad2c13d48c9fe62f898da822a5f08be3bf6c4e2c1c7ffdf7634f2ca4a8859e

        SHA512

        8317af5cc3ac802eb095f3fa8cc71daa1265ca58fead031c07872f3d4bb07663a7002ae734fad392a7617f0923fe0caf1f54ed55afdf8516a6a08e202d86fa7f